Interpreting Rogue Killer Log

Discussion in 'Malware Help - MG (A Specialist Will Reply)' started by Hiroshimasunset, Mar 7, 2013.

  1. Hiroshimasunset

    Hiroshimasunset Private E-2

    Hello,

    Today ESET Antivirus 6 detected and succesfully cleaned two variants of win32/kryptik.AMQ trojan from my system.

    I have just complete a malware removal procedure for windows 7 as directed in the thread from Malware Removal Forum (http://forums.majorgeeks.com/showthread.php?t=139681)

    I ran Defogger to disable dive emulation.
    Cleaned temp files wit CC Cleaner.
    disable UAC
    And then ran successful scans with Rogue Killer, MBAM, TDSS, Hitmanpro and MGTools.

    No Malware threats were detected, but Hitman Pro did find two traces of Yantoo Adware (which I have since researched and and not too concerned about).

    I am not sure how to interpret the Rogue Killer and MGTools logs and hoping someone with more knowledge can tell me if there is anything suspicious in them. There is something in the Rogue Killer log about 6 registry entries, but I'm not sure what it means.

    I have not noticed any unusual behaviour on my system and I would like to know if I can turn UAC back on.

    The log files from my scans are attached. Thanks for the help.
     

    Attached Files:

  2. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Do you know what this is? C:\ProgramData\DP45977C.lfl
     
  3. Hiroshimasunset

    Hiroshimasunset Private E-2

    No I'm not sure what that is. It was created 4 days ago. The folder has a size of 0 bytes.
     
  4. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    Delete it and tell me what issues remain.
     
  5. Hiroshimasunset

    Hiroshimasunset Private E-2

    ok...i've deleted it. Haven't noticed anything unusual happening on my system thius far. No warnings from Malwarebytes or ESET antivirus 6 in the past 3 days.
    I will keep monitoring my system and let you know if anything suspicious occurs.

    Can I turn UAC back on in the mean time?

    thanks for your help
     
  6. Kestrel13!

    Kestrel13! Super Malware Fighter - Major Dilemma Staff Member

    You're most welcome. :)

    If you are not having any other malware problems, it is time to do our final steps:
    1. We recommend you keep Malwarebytes Anti-Malware for scanning/removal of malware.
    2. If we had you use ComboFix, uninstall ComboFix (This uninstall will only work as written if you installed ComboFix on your Desktop like we requested.)
      • Press and hold the Windows key [​IMG] and then press the letter R on your keyboard. This opens the Run dialog box.
      • Copy and paste the below into the Run box and then click OK. Note the quotes are required
      • "%userprofile%\Desktop\combofix" /uninstall
        • Notes: The space between the combofix" and the /uninstall, it must be there.
        • This will uninstall ComboFix and also reset hidden files and folders settings back to Windows defaults.
    3. Go back to step 4 of the READ ME and renable your Disk Emulation software with Defogger if you had disabled it.
    4. Go to add/remove programs and uninstall HijackThis. If you don't see it or it will not uninstall, don't worry about it. Just move on to the next step.
    5. If running Vista or Win 7, it is time to make sure you have reenabled UAC by double clicking on the C:\MGtools\enableUAC.reg file and allowing it to be added to the registry.
    6. Goto the C:\MGtools folder and find the MGclean.bat file. Double click ( if running Vista, Win7, or Win 8 Right Click and Run As Administrator ) on this file to run this cleanup program that will remove files and folders related to MGtools and some other items from our cleaning procedures.
    7. If we had you download any registry patches like fixme.reg or fixWLK.reg (or any others) and running MGclean.bat did not remove, you can delete these files now.
    8. Any other miscellaneous tools we may have had you install or download can be uninstalled and deleted.
    9. If you are running Win 7, Vista, Windows XP or Windows ME, do the below:
      • Refer to the cleaning procedures pointed to by step 6 of the READ ME
        for your Window version and see the instructions to Disable System Restore which will flush your Restore Points.
      • Then reboot and Enable System Restore to create a new clean Restore Point.
    10. After doing the above, you should work thru the below link:
     

MajorGeeks.Com Menu

Downloads All In One Tweaks \ Android \ Anti-Malware \ Anti-Virus \ Appearance \ Backup \ Browsers \ CD\DVD\Blu-Ray \ Covert Ops \ Drive Utilities \ Drivers \ Graphics \ Internet Tools \ Multimedia \ Networking \ Office Tools \ PC Games \ System Tools \ Mac/Apple/Ipad Downloads

Other News: Top Downloads \ News (Tech) \ Off Base (Other Websites News) \ Way Off Base (Offbeat Stories and Pics)

Social: Facebook \ YouTube \ Twitter \ Tumblr \ Pintrest \ RSS Feeds